首页 | 官方网站   微博 | 高级检索  
     

基于LUC密码体制防欺诈的秘密共享方案
引用本文:庞辽军,李慧贤,王育民.基于LUC密码体制防欺诈的秘密共享方案[J].电子科技大学学报(自然科学版),2007,36(1):108-111.
作者姓名:庞辽军  李慧贤  王育民
作者单位:1.西安电子科技大学综合业务网国家重点实验室 西安 710071;
基金项目:国家重点基础研究发展计划(973计划),军事通信技术预研项目
摘    要:基于LUC密码体制,提出一种防欺诈的(t,n)门限秘密共享方案。在秘密恢复过程中,任何参与者能够对其他参与者所出示的子秘密进行验证,不仅能有效地阻止敌手窃取秘密,也能有效地防止内部成员之间的相互欺骗;各参与者的子秘密长度与秘密长度相同,方案的信息率为1,是一个理想的方案。该方案的安全性是基于LUC密码体制和Shamir的(t,n)门限秘密共享方案的安全性。

关 键 词:密码学    信息安全    秘密共享    门限方案
收稿时间:2005-03-28
修稿时间:2005-03-28

A Secret Sharing Scheme with Ability to Identify Cheaters Based on LUC Cryptosystem
PANG Liao-jun,LI Hui-xian,WANG Yu-min.A Secret Sharing Scheme with Ability to Identify Cheaters Based on LUC Cryptosystem[J].Journal of University of Electronic Science and Technology of China,2007,36(1):108-111.
Authors:PANG Liao-jun  LI Hui-xian  WANG Yu-min
Affiliation:1.National Key Lab. of Integrated Service Networks,Xidian Univ. Xi'an 710071;2.School of Comput. Sci.,Northwestern Polytechnical Univ. Xi'an 710072
Abstract:Secret sharing plays an important role in information security and data privacy. Based on LUC cryptosystem, a (t, n) threshold secret sharing scheme is proposed in this paper, which has the capability to identify cheater. In the secret recovery phase, each participant is allowed to check whether another participant provides the true share or not, which can prevent adversaries from getting the secret and the participants cheating each other efficiently. Each participant's share is as short as the shared secret. Therefore, this scheme is an ideal one with the information rate 1. The security of this scheme is based on that of the LUC cryptosystem and Shamir's (t, n) threshold secret sharing scheme.
Keywords:cryptography  information security  secret sharing  threshold scheme
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号